Popular Content

Hello!
Today we're starting AirVPN ninth birthday celebrations!
From a two servers service located in a single country providing a handful of Mbit/s, the baby has grown up to a wide infrastructure in 22 countries in three continents, providing now 230,000+ Mbit/s to tens of thousands of people around the world.
Software related development has also been powered up. Eddie Android edition is now a fully mature application which features an exclusive best effort method to prevent traffic leaks and a complete integration with AirVPN.
In 2019 AirVPN has also started operating in South America, on top of Asia, Europe and North America, and the infrastructure has grown significantly, counting now on more than 260 bare metal servers, whose traffic is mainly powered by tier1 and tier2 transit providers. AirVPN has also become recently an EFF "Super Major Donor" member.
Furthermore, and we're very glad to announce it here publicly for the first time, development for OpenBSD and FreeBSD has started. We are also integrating OpenVPN 3 on new software which will couple Eddie on UNIX-like systems, including Linux, during the second half of 2019. GDPR compliance was already a de facto standard for AirVPN way before the Regulation entered into force, mainly because we don't collect personal data, period. By the way the compliance is now fully formalized (check details in our Privacy Notice and Terms https://airvpn.org/privacy ). AirVPN provides probably the strongest protection to your data, not only personal data but all data, you can find on any service.
If you are an AirVPN customer or user, you are probably aware that our service is radically different than any other VPN service you might have met anywhere. No whistles and bells, no marketing fluff, no fake locations, no advertising on mainstream media, a transparent privacy policy, no trackers on the web site or in mobile applications, no bullshit of any kind in our infrastructure to sell your personal data to any personal data merchant, and above all a clear mission which is the very reason which AirVPN operates for. https://airvpn.org/mission
Many of you know that when you buy AirVPN service, you not only support yourself and improve your ability to exercise your fundamental rights, but you also support AirVPN mission.
However, while AirVPN in itself has flourished, AirVPN mission aims and values related to fundamental rights have experienced, in 2018 and 2019, a grim time.
Australia "encryption-busting" monstrous law is fully in force;
the European Union has definitively approved the bad Copyright Directive, mandating automated filters, which will unavoidably limit freedom of expression on big boards, and making the first step to undermine the liability exemptions of mere conduits and web publishers alike;
new threats to citizens' privacy are becoming real through plans of wide face recognition deployment, indiscriminate DNA databases proposals, more pervasive and efficient profiling (possibly even through AI), and strict cooperation between Internet tech giants and intelligence agencies;
the persecution of journalists, publishers and whistleblowers all around the world has reached unprecedented levels, revealing a widespread plan to suppress freedom of the press and freedom of expression even in so called "Western democracies".
One of the greatest journalists and publishers of all times, Julian Assange, nominated seven times for the Nobel Peace prize and winner of many journalistic prizes and awards, has been and is prosecuted and persecuted for having merely published the truth about war crimes, corruption, torture and more, with a 100% accuracy, and for having protected his sources as any good investigative journalist does.
He has been detained arbitrarily and illegally, as widely ascertained and recognized by the UN. He has been victim of an abominable smear campaign based on ignominious lies and defamation, a campaign aimed to turn the public opinion against him and distract from WikiLeaks publications content exposing war criminals in governments key positions, warmongers, torture maniacs, systematic illegal surveillance, endemic privacy violations and plots to limit and reduce fundamental rights. He is currently detained in solitary confinement 23 hours a day, with no access to books, maximum two visits per month, forbidden in practice to coordinate a defense with his lawyers, in a tiny cell of a maximum security UK prison which has been designed for dangerous murderers and terrorists, while UK will decide whether to extradite him to the USA to face a potential 175 years imprisonment.
Whistleblowers like Chelsea Manning, who should be regarded as a hero, as Noam Chomsky, John Pilger, Daniel Ellsberg and other titans of our times pointed out, have been tortured and are still persecuted by the very same criminals whose crimes were exposed.
Privacy activists and software developers, like Ola Bini in Ecuador, are imprisoned without charges, simply for having showed friendship to Assange or WikiLeaks, or for having developed software aimed to protect privacy through encryption.
And the list can go on and on and on.
But make no mistake: the dark times we are living in, the environment of fear and intimidation that various governments are building against the exercise of those fundamental rights which our mission forces us to protect to the best of our abilities, the mounting attacks against "encryption for everyone" and the awareness that enemies of human rights nestle inside government agencies, have not undermined our determination. Quite the opposite: they have convinced us that our service is even more necessary now and we are resolute to do even more.
Our mission has been and will be empowered by the ongoing support to projects and NGOs which aim to the protection of privacy, personal data and freedom of expression, now more than ever. We have confirmed our support to Tor and we will progressively add support to champions of freedom of expression and privacy in any way our capacities and abilities will allow us.
If you're curious to know something about a series of fortunate events which gave birth to AirVPN, have a look here: https://airvpn.org/aboutus
To worthily celebrate AirVPN ninth birthday, we're glad to inform you that starting from now we will offer a 20% discount on all long term plans. Hurry up, this special offer will end on June the 11th, 23:59:59 UTC! Check the new prices here.
Kind regards and datalove
AirVPN Staff

Hello!
We're very glad to inform you that a new 1 Gbit/s server located in São Paulo, BR, is available: Peony.
Peony is our first server in South America and we are very proud to start operating there. Special thanks go to out moderator Zhang who helped us find a datacenter with particularly good connectivity
The AirVPN client will show automatically the new server. If you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").
The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.
Just like every other "second generation" Air server, Peony supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.
Full IPv6 support is included as well.
As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.
You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/peony
Do not hesitate to contact us for any information or issue.
Kind regards and datalove
AirVPN Team

Hello!
We're very glad to inform you that twelve new 1 Gbit/s servers located in Alblasserdam (Netherlands) are available: Aljanah, Alpheratz, Aspidiske, Capella, Eltanin, Larawag, Melnick, Muhlifain, Piscium, Scuti, Suhail, Tiaki.
The AirVPN client will show automatically the new servers. If you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").
The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.
Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.
Full IPv6 support is included as well.
As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.
Do not hesitate to contact us for any information or issue.
Kind regards and datalove
AirVPN Team

Hello!
We're very glad to inform you that AirVPN has begun to actively contribute to OpenVPN 3 development.
Our first goal has been adding support for ChaCha20 cipher with Poly1305 as authenticator on OpenVPN 3 Data Channel.
ChaCha20 is a stream cipher developed by Daniel J. Bernstein which combines strength and remarkable performance. https://en.wikipedia.org/wiki/Salsa20#ChaCha20_adoption
When compared with AES-GCM, ChaCha20 offers significant computational relief to all AES-NI non supporting processors, such as ARM processors.
ARM processors, routinely used on very many tablets, smart phones, media centers, smart TVs and routers, will get great benefits from OpenVPN with ChaCha20. Our tests show that CPU load caused by ChaCha20 on recent ARM 64 bit processors is at least 50% less than AES-256-GCM, on equal terms, which translates into dramatic performance boost and longer battery life (if you have ever tested Wireguard on an ARM based device you know what we mean).
OpenVPN 3 is a client library. However, OpenVPN 2.5, which is currently in beta testing and includes all the necessary servers features, supports ChaCha20 on the Data Channel. Therefore, making OpenVPN 3 with ChaCha20 available to our users and allowing a real life test will be a matter of days. We will progressively release beta clients for Android, Linux, OpenBSD and FreeBSD, in this order. We are considering a porting to OpenIndiana as well.
Internal alpha testing has concluded successfully. We have already pulled a merge request to OpenVPN 3 main branch, to let the whole community take advantages from our code, and let OpenVPN developers merge the new code into the main branch if they wish so. https://github.com/OpenVPN/openvpn3/pull/78
Implementation has been designed, developed and programmed for AirVPN by ProMIND, who is also Eddie Android edition developer.
Stay tuned, more will come! UPDATE: https://airvpn.org/forums/topic/44069-openvpn-3-development-by-airvpn/
The above linked topic is now the central thread to discuss anything related to OpenVPN 3 development and testing.
Kind regards and datalove
AirVPN Staff

Hello!
We inform you that we have started contributions to Chelsea Manning's legal fund. We are proud to contribute to it but not "glad", meaning that in a really democratic and free country Chelsea Manning would not be detained indefinitely for her refusal to testify before a grand-jury (*) in matters that she exhaustively treated before a court martial, and would not need a legal fund at all by now.
(*) A grand jury means that the public is not allowed entry: the hearings are held in secret
She disclosed nearly 750,000 military and diplomatic documents to WikiLeaks revealing, amongst many other things, war crimes. I will not participate in a secret process that I morally object to, particularly one that has been used to entrap and persecute activists for protected political speech.
Chelsea Manning Manning should be regarded as a hero. [...] doing what an honest, decent citizen should be doing: letting your population know what the government, the people who rule you are doing. They want to keep it secret of course.
Noam Chomsky
Action Network page for Manning's legal fund donations:
https://actionnetwork.org/fundraising/chelsea-manning-needs-legal-funds-to-resist-a-grand-jury-subpoena
Check our mission page: https://airvpn.org/mission
Kind regards and datalove
AirVPN Staff

Hello!
Please note that we did not let the certificates expire. Deployment of new certificates always occur in due time and automatically. In this case the deployment got stuck (for a bug introduced by a human error, of course, but we are all human beings) when only a part of the VPN servers certificates were deployed. About 3/5 of the servers remained with old certificates, which expired 8 hours ago. The problem has been resolved.
Kind regards

Hello!
We proudly announce that today AirVPN has become an Electronic Frontier Foundation "Super Major Donor". The Electronic Frontier Foundation is the leading nonprofit organization defending civil liberties in the digital world. Founded in 1990, EFF champions user privacy, free expression, and innovation through impact litigation, policy analysis, grassroots activism, and technology development. We work to ensure that rights and freedoms are enhanced and protected as our use of technology grows. https://www.eff.org
Check our mission page: https://airvpn.org/mission
Kind regards and datalove
AirVPN Staff

I had the same error in the begin but when I select direct udp during making the confige files. and imported it again. Then it will connect well. I just wonder if I have to do more steps before I can use Sonarr for example.

Hello!
AirVPN is very proud to introduce for the first time ever OpenVPN 3 support for ChaCha20-Poly1305 cipher with Eddie Android edition 2.4.
The new implementation means remarkably higher performance and longer battery life for your Android device.
CPUs that do not support AES New Instructions, typically ARM CPUs mounted on most Android devices, are much faster to encrypt and decrypt a stream of data with ChaCha20 than AES. At the same time, ChaCha20 offers the same security when compared to AES. https://en.wikipedia.org/wiki/Salsa20#ChaCha_variant You can test right now the new cipher. We have prepared four test servers running OpenVPN 2.5 and supporting ChaCha20 in Canada and the Netherlands. When you pick ChaCha20 as cipher in Settings, Eddie will filter properly Air VPN servers to let you connect to them.
The outstanding feature has been made possible by AirVPN implementation on "OpenVPN AirVPN" of new directives, never supported before by OpenVPN 3, as well as a brand new, rationally re-engineered class for AEAD ciphers, which currently includes both AES-GCM and ChaCha20. Development of OpenVPN 3 will go on during the next months. Here's the current status:
Eddie Android edition available languages are: Chinese (simplified), Chinese (traditional), Danish, Dutch, English, French, German, Italian, Portuguese, Spanish, Russian, Turkish.
Eddie for Android is free and open source software released under GPLv3. We invite you to check from independent 3rd parties lack of trackers code signatures, for example here: https://reports.exodus-privacy.eu.org/en/reports/search/org.airvpn.eddie
You can download Eddie Android 2.4 apk directly from our repository: https://eddie.website/repository/eddie/android/2.4/org.airvpn.eddie.apk
You can also download it from the Google Play Store: https://play.google.com/store/apps/details?id=org.airvpn.eddie
and in Amazon Appstore: https://www.amazon.com/Eddie-AirVPN-official-OpenVPN-GUI/dp/B07KTD6DH9/ref=sr_1_1?keywords=eddie+airvpn
Source code is available in GitLab: https://gitlab.com/AirVPN/EddieAndroid/
How to enable ChaCha20 on the Data Channel
Open "Settings" view, then open "AirVPN". Locate "Encryption Algorithm", tap it and set "CHACHA20-POLY1305", then tap "OK".
New in version 2.4:
Updated native library to OpenVPN 3.3 AirVPN
ChaCha20-Poly1305 support on both OpenVPN Control and Data channels
Support by OpenVPN 3 AirVPN of ncp-disable directive integrated in the app according to the cipher suite picked by the user
For new features complete list, please see the changelog at the bottom of this post
Main features:
Free and open source OpenVPN GUI based on "OpenVPN 3.3 AirVPN"
Complete ChaCha20, AES-GCM and AES-CBC support
The only Android application officially developed by AirVPN
Robust, best effort prevention of traffic leaks outside the VPN tunnel
Battery-conscious application
Low RAM footprint
Ergonomic and friendly interface
Ability to start and connect the application at device boot
Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list
Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish
Full integration with AirVPN
Enhanced security thanks to locally stored encrypted data through master password
Quick one-tap connection and smart, fully automated server selection
Smart server selection with custom settings
Manual server selection
Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over
Full Android TV compatibility including D-Pad support. Mouse emulation is not required.
Enhancements aimed to increase accessibility and comfort to visually impaired persons
AirVPN servers sorting options
Customizable "Favorite" and "Forbidden" servers and countries
OpenVPN mimetype support to import profiles from external applications
Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN profiles
Support for custom bootstrap servers
Support for favorite and forbidden countries
AirVPN broadcast messages support
User's subscription expiration date is shown in login/connection information
The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources
Optional local networks access. In such case, local network devices are exempted from the VPN and can be accessed within the local devices
Localization override. User can choose the default language and localization from one of the available ones
Favorite and forbidden lists can be emptied with a single tap
VPN Lock can now be disabled or enabled from settings
VPN reconnection in case of unexpected OpenVPN disconnection. (It requires VPN Lock to be disabled)
User can generate an OpenVPN profile for any AirVPN server or country and save it in OpenVPN profile manager
Server scoring algorithm implementing the latest AirVPN balancing factors in order to determine the best server for quick connection
Network name and extra information are shown along with network type
Device network status management
Kind regards & datalove
AirVPN Staff Changelog 2.4 (VC 26) - Release date: 30 July 2019 by ProMIND
[ProMIND] Production release
Changelog 2.4 RC 1 (VC 25) - Release date: 26 July 2019 by ProMIND
[ProMIND] OpenVPN 3.3 AirVPN fork synchronized to master OpenVPN branch
[ProMIND] Native library dependencies updated to the latest releases
[ProMIND] Minor bug fixes
ConnectAirVPNServerFragment.java
[ProMIND] connectServer(): pendingServerConnection is now properly cleared. This prevents a double call from onAirVPNLogin event (user login + user credentials loaded from AirVPN server) in case of a pending server connection going on
Changelog 2.4 beta 1 (VC 24) - Release date: 19 July 2019 by ProMIND
[ProMIND] Updated native library to "OpenVPN 3.3 AirVPN" supporting CHACHA20-POLY1305 cipher and ncp-disable profile option (forked from OpenVPN:master 3.2 qa:d87f5bbc04)
[ProMIND] Updated default manifest to V256
airvpn_server_listview_item.xml
[ProMIND] added a new layout for showing server's warning_open field
AirVPNServerProvider.java
[ProMIND] Added cipher filter according to user settings
AirVPNServerSettingsActivity.java
[ProMIND] Added encryption algorithm option for AirVPN servers
AirVPNServer.java
[ProMIND] Added class members to comply to Manifest V256
AirVPNServerGroup.java
[ProMIND] New class for manifest V256 handling
AirVPNUser.java
[ProMIND] getOpenVPNProfile(): profile generator uses "cipher" and "ncp-disable" according to the user settings
[ProMIND] getPasswordDialog(): soft keyboard is shown by default
[ProMIND] loginDialog(): soft keyboard is shown by default
CipherDatabase.java
[ProMIND] New class for manifest V256 handling
ConnectAirVPNServerFragment.java
[ProMIND] Show a warning in yellow in case server has a warning_open status
[ProMIND] Servers are now filtered according to selected encryption
[ProMIND] searchDialog(): soft keyboard is shown by default
ConnectionInfoFragment.java
[ProMIND] Added cipher name and digest to info box
OpenVPNTunnel.java
[ProMIND] Added method getProtocolOptions()
QuickConnectFragment.java
[ProMIND] Show user selected encryption in status box
SettingsActivity.java
[ProMIND] Added encryption algorithm option for AirVPN servers
SettingsManager.java
[ProMIND] Added methods getAirVPNCipher() and setAirVPNCipher()
SupportTools.java
[ProMIND] Changed AIRVPN_SERVER_DOCUMENT_VERSION to 256
[ProMIND] editOptionDialog(): soft keyboard is shown by default
VPN.java
[ProMIND] Added class members cipherName and digest

The discussion about Eddie has become a real hot topic in the past weeks. And understandably so, given the fact that "Eddie" is a core element of the whole service and a highly sophicticated one too.
But i think that one has to consider the fact that AIR has to develop software for 4 OS'es (WIndows, Linux, Mac and Android) if i am not mistaken. That's a hell lot of work to do and it takes lots of time to develop a fully functioning client from scratch.
There are other VPN services out there that give a shit about their client, hell, they don't even have one for Linux, let alone for Mac OS X.
The community itself is a little "spoiled" in this regard, if i may say so.
I am a bit impatient too and i am awaiting the release of the new client quite eagerly. But it doesn't help much if the community puts pressure on the devs.
If they release the new client too early with a lot of bugs, then the community complains about a buggy client, and all hell breaks loose. So just let the devs make their job and i am confident that a new version is coming soon.
Regards,
BB

Hi Mikeyy, thanks to your excellent manual I've setup VPN on my DS. The VPN started, but nothing is routed over it. As a test I downloaded something via a newsserver with Downloadstation. But according to the Network Interface the amount of sent and received bytes stays at zero. And in my AirVPN the traffic also stays at 12/13 Kb received/sent. Any idea? p.s. I am on DSM 6.1 beta with active airvpn membership. During install there was no option to compress data on the VPN. I still can connect to the webinterface of my DS without implementing 3.1.

Website: http://www.gazzetta.it La Gazzetta dello Sport, an Italian sport website and streaming. Status: OK Routing: All servers to IT route. Note: if you have an advertising blocker active (like Adblock or uBlock) try to disable it. This site detect use of this blocker and prevent to see the video.

Hello,
we have experienced a problem with VPN server LetsEncrypt certificates deployment. The system procedure got stuck and failed to deploy updated certificates. In turn, such a failure caused "route check" failures on Eddie desktop editions, and ONLY on them, due to expired certificates verified by cURL during the route check phase.
The problem has been affecting a wide amount of VPN servers for about 8 hours and has been resolved completely now. We deeply apologize for any inconvenience.
Kind regards
AirVPN Staff

Hi, I'm sorry about the delay on Eddie development, but in the next release we changed all source code from the ground up, to separate what needs elevated privileges and what not.
So we are re-testing all Eddie features.
For example, in the next release UI runs as normal user, and this can fix or cause worse issues in different Linux distributions. Re-testing all major distributions requires a lot of time.
Anyway, I hope to release it (as a beta version for feedback) when all supported OS (Win/macOS/Linux) are ready for use.
This is related to the next release of 2.X branch (the same UI you know).
In the meantime, we are building also the new universal UI for 3.X branch.
I hope we can release the new 2.x version as soon as possible.
I hope I can give you a date in a few days.
Sorry again for the delay.

Hello!
We are very glad to inform you that our OpenVPN 3 development is progressing swiftly. Today we implemented directive ncp-disable which was still unsupported in OpenVPN 3. https://github.com/AirVPN/openvpn3-airvpn
The directive is instrumental to allow clients Data Channel cipher free selection between those available on server, when ncp-ciphers is declared on server side, and keep at the same time total backward compatibility. Since when we implemented ChaCha20-Poly1305 https://airvpn.org/forums/topic/43850-openvpn-3-development/ on OpenVPN 3 Data Channel, "ncp-disable" has become a priority to provide servers and clients with maximum flexibility.
We can therefore leave total freedom to clients to pick between AES-GCM, AES-CBC and ChaCha20 while preserving full backward compatibility.
Clients with AES-NI supporting processors will prefer AES, while clients running on CPUs without AES-NI, for example most ARM CPUs, will of course tend to prefer ChaCha20.
We are working hard to bring you first and foremost a new Eddie Android edition beta version to let you test ChaCha20-Poly1305 on your Android devices as soon as possible. All internal tests both with ChaCha20 and ncp-disable have been fully successful so far. Fingers crossed, maybe you will see a beta release as early as next week.
UPDATE: Eddie Android edition with ChaCha20 support on both Data and Control Channel is now available https://airvpn.org/forums/topic/44201-eddie-android-edition-24-beta-1-released-chacha20-support/ https://github.com/AirVPN/openvpn3-airvpn
Changelog 3.3 AirVPN - Release date: 13 July 2019 by ProMIND
- [ProMIND] [2019/06/02] Forked master openvpn3 repository 3.2 (qa:d87f5bbc04)
- [ProMIND] [2019/06/06] Implemented CHACHA20-POLY1305 cipher for both control and data channels
- [ProMIND] {2019/07/10] Implemented ncp-disable profile option
Kind regards and datalove
AirVPN Staff

Hello!
We are glad to inform you that we support Mastodon as "Platinum" donors. Mastodon is an online, self-hosted, federated, community owned and ad-free social media and social networking service https://joinmastodon.org
Check our mission page: https://airvpn.org/mission
Kind regards and datalove
AirVPN Staff

Hello!
We're very glad to inform you that a new 1 Gbit/s server located in Belgrade (RS) is available: Alnitak.
The AirVPN client will show automatically the new server. If you use the OpenVPN client you can generate all the files to access it through our configuration/certificates/key generator (menu "Client Area"->"Config generator").
The server accepts connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.
Just like every other "second generation" Air server, Alnitak supports OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.
Full IPv6 support is included as well.
As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.
You can check the server status as usual in our real time servers monitor: https://airvpn.org/servers/Alnitak
Do not hesitate to contact us for any information or issue.
Kind regards and datalove
AirVPN Team

I know Air cares a lot about protecting *against* (edit: forgot an important word here) censorship across the world, but is it necessary to turn their company Twitter into a 24/7 ‘Free Assange’ machine? I like to follow it for finding out new info about VPN servers and things of that matter. Up until a few weeks ago, it was relatively dormant and only seemed to tweet when there was new things about the company*. Now it’s almost turning into an echo chamber for the “anti-MSM” crowd.
(*yes, you may be run by activists, but you are a business. Don’t forget that).
As a business owner who does do a lot of social, one of the most important pieces of advice I can give is to separate the politics from your company unless there’s a 1000% connection between the two. I don’t think Assange was an AirVPN user and whether or not you agree with his treatment as of late, it probably doesn’t impact the AirVPN service in any way. I’m also sure there are many other instances of freedom of speech being trampled upon that don’t involve him yet do involve presumably innocent people being jailed for speaking the truth. Whoever is running that Twitter should make a separate personal account and use that as his soapbox as it could lead to potential new users deciding to use a less political VPN provider. https://twitter.com/airvpn

Hello!
We're very glad to inform you that five new 1 Gbit/s servers located in Frankfurt (Germany) are available: Alsephina, Dubhe, Menkalinan, Mirfak, Mirzam.
The AirVPN client will show automatically the new servers. If you use the OpenVPN client you can generate all the files to access them through our configuration/certificates/key generator (menu "Client Area"->"Config generator").
The servers accept connections on ports 53, 80, 443, 1194, 2018 UDP and TCP.
Just like every other "second generation" Air server, they support OpenVPN over SSL and OpenVPN over SSH, TLS 1.2 and tls-crypt.
Full IPv6 support is included as well.
As usual no traffic limits, no logs, no discrimination on protocols and hardened security against various attacks with separate entry and exit-IP addresses.
Do not hesitate to contact us for any information or issue.
Kind regards and datalove
AirVPN Team

Sao Paulo is as cental America as you can get. "Lite South" America would be something like Mexico/Panama in where it would be better getting a server in Miami instead,
for both ping and bandwidth related performance.
Geographical center:
Panama/Mexico/Costa Rica - Most providers are limited to lease a shared 100mbit connection per customer. This is because they have max 5-10Gbit per datacenter or less.
Because of that, their main peering happens to be with U.S. providers, so see the sentence above.
"Southern South":
Rest of the countries are not going to happen - Peru, Chile, Argentina. No sufficient datacenters to offer quality bandwidth for a reasonable price. Wholesale of 1Gbit almost unspoken of.
Bolivia, Paraguay, Uruguay - the same reasons as above, + add at least 5 more years for their availability after the countries above.
Most providers in those areas offer only shaped 10Mbit traffic (yes, in 2019) with a burstable option to 100Mbit with a very high premium.
Those providers mostly offer local data as well as CDN to companies like Akamai, Cloudflare, Google which is their most profitable way of operation.
Other Caribbean islands or countries with less than 5M residents - can be totally dismissed. Not a valid option even for large "Big 10" companies to operate.
An exotic new location will not give you the privacy/performance you would probably assume from a service like Air. So this is a strategic point which is totally
transparent and provable. Don't make other providers who sell fake GeoIP locations (this is possible and actually much cheaper) or sell VPS/Cloud connectivity
with limited 100Mbit b/w make your decision here, test your own locations with your maximum speed before you buy a VPN service. And always remember:
If AirVPN ever wanted to cross that grey area, there would probably be 50 available countries now. Or maybe 100. This is not an ethical way to do (VPN) business.
Not flagging any competitors here since we all know who they are.
//
Finding even a single provider in South America with apparently enough bandwidth and acceptable prices (probably because they have more than utilized) is not an easy task
by it's own. Right now no other country can probably overcome Brazil by price/performance, where even 3 years ago the situation was nearly as same as above.
Same things happen is East Asia as well, where I am more native, and is directly linked to the country GDP.
(The case has some exceptions in countries like Ukraine, Romania) because they are strategically and historically big EU transit points where AirVPN operates. But largely if it costs more
than an average monthly salary to get a 100mbit connectivity, this country cannot be generally considered as a valid location.

Hi Mikeyy, sorry for the delay. Before your answer I did figure out a restart myself. And that got things going. But my forum message was still not approved, so I couldn't alter it. So in the end I managed to download stuff via DS Get via VPN. But all of my webservices were not reachable anymore. I read about that before hand, but thought a bit too optimisticly. After reading up on it, I got scared whether I would be able to have a VPN and run my webservices at the same time. I would need passthrough of: -torrents -IMAP -SMTP -POP3 -webinterface of synology To be honest I am afraid that I am not capable enough to make all those things work.

Tried restarting DS? I don't use DSM 6.1, so I wouldn't know if something changed. But sometimes same thing happens to me on 6.0, VPN is up, but you can't reach anything. Not sure if it's DSM problem or AirVPN problem, but DS reboot usually fix it.

Hi, I have followed this guide and tried both a specific netherlands server and netherlands in general but the DSM keeps returning error (in screenshot). Can someone please help me? I am not sure where i can find more detailed logs in the synology so please assist with this if this will help getting it resolved. Thank you in advance

Hello,
we have experienced a problem with VPN server LetsEncrypt certificates deployment. The system procedure got stuck and failed to deploy updated certificates. In turn, such a failure caused "route check" failures on Eddie desktop editions, and ONLY on it, due to expired certificates verified by cURL during the route check phase.
The problem has been affecting a wide amount of VPN servers for about 8 hours and has been resolved completely now. We deeply apologize for any inconvenience.
Kind regards

I think I saw that error some time ago, when I was using 1 year or more old certificates for AirVPN. Did you upgrade your DSM to latest 6+ version? Did you get new certificates and ovpn file from airvpn? Be sure to imput them at correct place. Is your AirVPN membership active? If you are using DSM <6 (5.2, 5.1, 5.0, 4...) then you need to ssh and copy certificates and keys manually. Just delete VPN from Synology interface, try restart, and do everything from beginning. I see what you mean. That never happened to me. Script always starts VPN if it's not started, but I managed to reproduce it by just using those variables in script, without anything else. Thank you for find, I just moved those variables further down to one of IFs, so they will be called only when VPN is up for sure. Hope that solves it for you also.

Oh maybe there's a better way. When I ran the script the first time, the vpn was disconnected and the script would just hang. Took me a bit of time to debug it to find the UPTIME=... the culprit. At the very least, if IPADDR isn't set the script should log it and exit since otherwise it just hangs (since the grep is waiting for stdin if IPADDR is empty).

Wow, good idea! Will add it. Not sure why you added other part? If VPN is off, current script will start it (when cronjob runs). If VPN is ON, but it's in error state (not letting traffic trough) it will kill VPN and start it again. EDIT: Added your contribution to tutorial. Changed some parts of tutorial. You no longer need to copy script to /usr/ folder. It's better if it stays in shared folder of your choice since there it will survive system upgrades.

Assuming you mean Virgin Media UK. How did you determine this? Why would they mess with DNS to the web site rather than routing to the actual OpenVPN servers? Its a nice web site but not even that important to AirVPN users who only actually need it for initial setup. This is a curiosity only question as the solution of using an alternative DNS doesn't seem to have any downsides.